|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 28 occurrences of 28 keywords
|
|
|
Results
Found 3 publication records. Showing 3 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
36 | John F. Banzhaf |
When your computer needs a lawyer. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Commun. ACM ![In: Commun. ACM 11(8), pp. 543-549, 1968. The full citation details ...](Pics/full.jpeg) |
1968 |
DBLP DOI BibTeX RDF |
constacts, criminals, evidence copying, income tax, lawyer, liabilty, negligence, record keeping records, slander of credit, standard of care, torts, warrantees, simulation, accounting, regulations, copyrights, evidence, law, patents, legal, copying, guarantees, crime, trade secrets |
30 | Manuel Mucientes, David L. Moreno, Alberto Bugarín, Senén Barro |
Evolutionary learning of a fuzzy controller for wall-following behavior in mobile robotics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Soft Comput. ![In: Soft Comput. 10(10), pp. 881-889, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Wall-following behavior, Evolutionary algorithms, Mobile robotics, Fuzzy control |
30 | Vishwa Prasad, Sreenivasa Potakamuri, Michael Ahern, Igor Balabine, Michah Lerner, Partha Dutta |
Scalable Policy Driven and General Purpose Public Key Infrastructure (PKI). ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 16th Annual Computer Security Applications Conference (ACSAC 2000), 11-15 December 2000, New Orleans, Louisiana, USA, pp. 138-, 2000, IEEE Computer Society, 0-7695-0859-6. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
interoperable security infrastructure, AT? Labs, multiple certificate authorities, third-party CA systems, uniform enrollment procedures, Verisign, authenticated IP services, policy descriptions, certificate sources, X.509v3 certificates, CRML, PKCS, X509, XML, software architecture, authentication, public key cryptography, certification, client-server systems, public key infrastructure, revocation, intranets, message authentication, CRL, OCSP, middleware platform |
Displaying result #1 - #3 of 3 (100 per page; Change: )
|
|